UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan

Secure Socket Layer (SSL) / Transport Layer Security (TLS) protocol has become a standard way for establishing a secure communication channel in internet application. In recent years several vulnerabilities related to SSL/TLS protocol were disclosed. TLS is a protocol that provides privacy and data...

Full description

Saved in:
Bibliographic Details
Main Author: Hassan, Sufian Ibnu
Format: Thesis
Language:English
Published: 2018
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/109390/1/109390.pdf
https://ir.uitm.edu.my/id/eprint/109390/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.109390
record_format eprints
spelling my.uitm.ir.1093902025-01-20T02:22:56Z https://ir.uitm.edu.my/id/eprint/109390/ UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan Hassan, Sufian Ibnu Web applications Secure Socket Layer (SSL) / Transport Layer Security (TLS) protocol has become a standard way for establishing a secure communication channel in internet application. In recent years several vulnerabilities related to SSL/TLS protocol were disclosed. TLS is a protocol that provides privacy and data integrity between two communicating applications. It’s the most widely deploy security protocol used today, and is used for web browsers and others applications that require data to be securely exchanged over a network, such as file transfers, Virtual Private Network (VPN) connections, instant messaging and Voice over Internet Protocol (IP). Implementation flaws have always been a big problem with any encryption technology and SSL/TLS is no exception. A variant of the attack has exploited certain implementation of the SSL/TLS protocol that doesn’t correctly validate encryption padding. In this paper, the researcher aims to disclose the vulnerabilities contained on the Universiti Teknologi Mara (UiTM) website and presents an analysis and evaluation of attack on SSL/TLS. Three tools (DNSRecond, SSLlabs.com and Auto Scanning to SSL Vulnerability A2SV) are used to test the output of a system without knowing the process inside the system itself. The experiments on UiTM website focused on SSL/TLS protocol and gathers information about existing SSL/TLS in the server. The experiments started with gathering information about the UiTM server using DNSRecond tool which is it perform top level domain scan. The result showed all server information, Domain Name Server (DNS), Mail Exchange (MX) and IP range in UiTM website. Secondly scanning the website using SSLlabs.com which is researcher discovered some vulnerability on the server such as certificate validity status and cipher suite weak. The last testing using A2SV tool which scan more detailed on vulnerability on the UiTM server. Additionally, in this paper dummy server testing scenario conducted to show how server handles invalid/expired SSL certificate. This experiment compared two type of browser chrome and internet explorer (IE). Researcher deployed invalid SSL certificate on both web browser and surprisingly IE validated certificate while chrome is otherwise. Based on the testing result information, researcher comes out with mitigation technique and compiled as a report that can be share with UiTM website administrator for better security implementation. In addition from the finding, researcher suggest that better tools and education programs for SSL/TLS security are needed to help UiTM administrator keep their system up-to-date with security patches. 2018 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/109390/1/109390.pdf UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan. (2018) Masters thesis, thesis, Universiti Teknologi MARA (UiTM). <http://terminalib.uitm.edu.my/109390.pdf>
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Web applications
spellingShingle Web applications
Hassan, Sufian Ibnu
UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan
description Secure Socket Layer (SSL) / Transport Layer Security (TLS) protocol has become a standard way for establishing a secure communication channel in internet application. In recent years several vulnerabilities related to SSL/TLS protocol were disclosed. TLS is a protocol that provides privacy and data integrity between two communicating applications. It’s the most widely deploy security protocol used today, and is used for web browsers and others applications that require data to be securely exchanged over a network, such as file transfers, Virtual Private Network (VPN) connections, instant messaging and Voice over Internet Protocol (IP). Implementation flaws have always been a big problem with any encryption technology and SSL/TLS is no exception. A variant of the attack has exploited certain implementation of the SSL/TLS protocol that doesn’t correctly validate encryption padding. In this paper, the researcher aims to disclose the vulnerabilities contained on the Universiti Teknologi Mara (UiTM) website and presents an analysis and evaluation of attack on SSL/TLS. Three tools (DNSRecond, SSLlabs.com and Auto Scanning to SSL Vulnerability A2SV) are used to test the output of a system without knowing the process inside the system itself. The experiments on UiTM website focused on SSL/TLS protocol and gathers information about existing SSL/TLS in the server. The experiments started with gathering information about the UiTM server using DNSRecond tool which is it perform top level domain scan. The result showed all server information, Domain Name Server (DNS), Mail Exchange (MX) and IP range in UiTM website. Secondly scanning the website using SSLlabs.com which is researcher discovered some vulnerability on the server such as certificate validity status and cipher suite weak. The last testing using A2SV tool which scan more detailed on vulnerability on the UiTM server. Additionally, in this paper dummy server testing scenario conducted to show how server handles invalid/expired SSL certificate. This experiment compared two type of browser chrome and internet explorer (IE). Researcher deployed invalid SSL certificate on both web browser and surprisingly IE validated certificate while chrome is otherwise. Based on the testing result information, researcher comes out with mitigation technique and compiled as a report that can be share with UiTM website administrator for better security implementation. In addition from the finding, researcher suggest that better tools and education programs for SSL/TLS security are needed to help UiTM administrator keep their system up-to-date with security patches.
format Thesis
author Hassan, Sufian Ibnu
author_facet Hassan, Sufian Ibnu
author_sort Hassan, Sufian Ibnu
title UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan
title_short UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan
title_full UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan
title_fullStr UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan
title_full_unstemmed UiTM website SSL/TLS vulnerability and mitigation / Sufian Ibnu Hassan
title_sort uitm website ssl/tls vulnerability and mitigation / sufian ibnu hassan
publishDate 2018
url https://ir.uitm.edu.my/id/eprint/109390/1/109390.pdf
https://ir.uitm.edu.my/id/eprint/109390/
_version_ 1823097909698101248
score 13.23648